International audienceA fault attack is a well-known technique where the behaviour of a chip is voluntarily disturbed by hardware means in order to undermine the security of the information handled by the target. In this paper, we explore how Electromagnetic fault injection (EMFI) can be used to create vulnerabilities in sound software, targeting a Cortex-M3 microcontroller. Several use-cases are shown experimentally: control flow hijacking, buffer overflow (even with the presence of a canary), covert backdoor insertion and Return Oriented Programming can be achieved even if programs are not vulnerable in a software point of view. These results suggest that the protection of any software against vulnerabilities must take hardware into accou...
Electromagnetic Fault Injection (EMFI) is considered as an effective fault injection technique for t...
Securing connected devices is one of the biggest challenge of the internet of things. Among existing...
Part 3: Trusted ExecutionInternational audienceSide-channel attacks (SCA) exploit the reification of...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...
International audienceInjection of transient faults can be used as a way to attack embedded systems....
EMFI has become a popular fault injection (FI) technique due to its ability to inject faults precise...
10 pagesInternational audienceInjection of transient faults as a way to attack cryptographic impleme...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
Electromagnetic fault injection (EMFI) is a well known technique used to disturb the behaviour of a ...
During this thesis, we focused on the security of mobile devices. To do this, we explored physical a...
Software-based and hardware-based approaches have both been used to detect fault injection vulnerabi...
International audienceHarvard architecture CPU design is common in the embedded world. Examples of H...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
Electromagnetic Fault Injection (EMFI) is a well-known technique for performing fault injection atta...
Electromagnetic Fault Injection (EMFI) is considered as an effective fault injection technique for t...
Securing connected devices is one of the biggest challenge of the internet of things. Among existing...
Part 3: Trusted ExecutionInternational audienceSide-channel attacks (SCA) exploit the reification of...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
Hardware and software of secured embedded systems are prone to physical attacks. In particular, faul...
International audienceInjection of transient faults can be used as a way to attack embedded systems....
EMFI has become a popular fault injection (FI) technique due to its ability to inject faults precise...
10 pagesInternational audienceInjection of transient faults as a way to attack cryptographic impleme...
Short version of the article "Experimental evaluation of two software countermeasures against fault ...
Electromagnetic fault injection (EMFI) is a well known technique used to disturb the behaviour of a ...
During this thesis, we focused on the security of mobile devices. To do this, we explored physical a...
Software-based and hardware-based approaches have both been used to detect fault injection vulnerabi...
International audienceHarvard architecture CPU design is common in the embedded world. Examples of H...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
Electromagnetic Fault Injection (EMFI) is a well-known technique for performing fault injection atta...
Electromagnetic Fault Injection (EMFI) is considered as an effective fault injection technique for t...
Securing connected devices is one of the biggest challenge of the internet of things. Among existing...
Part 3: Trusted ExecutionInternational audienceSide-channel attacks (SCA) exploit the reification of...